This project contains files for cyber security
☆37Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Projects that show my knowledge and experience of Cyber Security.☆15Jan 27, 2022Updated 4 years ago
- ☆15Mar 13, 2021Updated 5 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Code for USENIX'18 paper: "Effective Detection of Multimedia Protocol Tunneling using Machine Learning"☆11Nov 19, 2021Updated 4 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 4 months ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- Machine learning project with Insight Centre for Data Analytics.☆15Sep 7, 2017Updated 8 years ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Code of "MalDetect: A Structure of Encrypted Malware Traffic Detection"☆16Sep 9, 2019Updated 6 years ago
- An LLM Based Research Paper Generator☆12Mar 16, 2025Updated last year
- An Interpretable Self-Attention Network with block-attention and attention-attribution.☆12Sep 22, 2023Updated 2 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆21Mar 1, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 7 years ago
- This is the official repository for the ICLR 2023 paper Causal Balancing for Domain Generalization☆13May 17, 2023Updated 2 years ago
- A list of web application security☆15Dec 26, 2019Updated 6 years ago
- Machine learning model for detecting DDoS attacks, CIC-DDoS2019 dataset☆24Nov 25, 2024Updated last year
- An IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.☆13Oct 2, 2016Updated 9 years ago
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆226Apr 25, 2024Updated 2 years ago
- 易观性别年龄预测算法大赛--第8名解决方案☆11Oct 19, 2018Updated 7 years ago
- ☆11Sep 28, 2022Updated 3 years ago
- Wideband spectrum sensing dataset☆10Jun 11, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This repository contains the implementation of a DDOS attack detection system using a Software-Defined Networking (SDN) network.☆17Jun 5, 2023Updated 2 years ago
- ☆10Apr 7, 2021Updated 5 years ago
- 数据清洗与合并 Data Cleaning and Merging ; 机器学习模型 Machine Learning Models; 深度学习模型 Deep Learning Models ;PCA, t-SNE分析 PCA, t-SNE Analysis; 数据,结…☆18Jun 18, 2024Updated last year
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- pytorch version of the SAFE neural network☆55Jun 22, 2022Updated 3 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Codee☆17Dec 9, 2020Updated 5 years ago
- Imputation of Missing Data in Tables☆12Aug 24, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆14May 9, 2023Updated 3 years ago
- The project is to detect malware traffic in TLS flows using ML☆36Feb 24, 2020Updated 6 years ago
- ☆14Feb 4, 2022Updated 4 years ago
- ☆12Jun 26, 2020Updated 5 years ago
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago
- An open source tool chain to simulate cyber attacks in the power system☆12May 4, 2017Updated 9 years ago
- DDOS Mitigation System based on Ryu SDN Controller with Port Blocking Mechanism☆27Jun 6, 2023Updated 2 years ago